Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Complementing DRM with digital watermarking: mark, search, retrieve., , and . Online Information Review, 31 (1): 10-21 (2007)StirMark Benchmark: Audio Watermarking Attacks., , , , , , , and . ITCC, page 49-54. IEEE Computer Society, (2001)An Efficient Intrinsic Authorship Verification Scheme Based on Ensemble Learning., and . ARES, page 571-578. IEEE Computer Society, (2014)Semi-Fragile Watermarking for Image Authentication with High Tampering Localization Capability., and . AXMEDIS, page 143-152. IEEE Computer Society, (2006)A new method for image reconstruction using self-embedding., , , and . ICASSP, page 7430-7434. IEEE, (2014)Improved Manipulation Detection with Convolutional Neural Network for JPEG Images., , and . ARES, page 39:1-39:6. ACM, (2019)Towards a Process Model for Hash Functions in Digital Forensics., , , , , and . ICDF2C, volume 132 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 170-186. Springer, (2013)Robust message authentication code algorithm for digital audio recordings., and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 650508. SPIE, (2007)Public automated web-based evaluation service for watermarking schemes: StirMark benchmark., , , , , and . Security and Watermarking of Multimedia Contents, volume 4314 of SPIE Proceedings, page 575-584. SPIE, (2001)Evaluation of robustness and transparency of multiple audio watermark embedding., and . Security, Forensics, Steganography, and Watermarking of Multimedia Contents, volume 6819 of SPIE Proceedings, page 68190Z. SPIE, (2008)